CNC machines are widely used in production fields since they produce similar parts in a minimum time, at higher speed and with possibly minimum error. A control system is designed, implemented and tested to control the operation of a laboratory CNC milling machine having three axes that are moved by using a stepper motor attached to each axis. The control system includes two parts, hardware part and software part, the hardware part used a PC (works as controller) connected to the CNC machine through its parallel port by using designed interface circuit. The software part includes the algorithms needed to control the CNC. The sample needs to be machined is drawn by using one of the drawing software like AUTOCAD or 3D MAX and is saved in a well-known file format (DXF), then that file is fed to the CNC machine controller by the CNC operator, so that part will be machined by the CNC machine. The CNC controller using developed algorithms that reads the DXF file feeds to the machine, extracts (line, circle or arc) shapes from the file and generates commands to move the CNC machine axes so that these shapes can be machined.
In this study, the response and behavior of machine foundations resting on dry and saturated sand was investigated experimentally. A physical model was manufactured to simulate steady state harmonic load applied on a footing resting on sandy soil at different operating frequencies. Total of (84) physical models were performed. The parameters that were taken into consideration include loading frequency, size of footing and different soil conditions. The footing parameters are related to the size of the rectangular footing and depth of embedment. Two sizes of rectangular steel model footing were used. The footings were tested by changing all parameters at the surface and at 50 mm depth below model surface. Meanwhile, the investigated paramete
... Show MoreThis study aims at identifying the role played by Public Relations in the field of security awareness of the dangers of terrorism. The research is directed to the employees at the Directorate General of Public Relations and Media at the Ministry of Interior. And that on the basis that those who play an important role in the security awareness are the security institutions, primarily the Ministry of Interior, since this Directorate is responsible for all subjects related to the public security using public relations science. It aims at identifying the functions, methods and communication tools used by the Directorate to raise awareness about the dangers of terrorism. In order to achieve the research objectives, the researcher uses the sur
... Show MoreCollapsing building structures during recent earthquakes, especially in Northern and Eastern Kurdistan, including the 2003 earthquake in Cewlig; the 2011 earthquake in Van; and the 2017 earthquake near Halabja province, has raised several concerns about the safety of pre-seismic code buildings and emergency facilities in Erbil city. The seismic vulnerability assessment of the hospital buildings as emergency facilities is one of the necessities which have a critical role in the recovery period following earthquakes. This research aims to study in detail and to extend the present knowledge about the seismic vulnerability of the Rizgary public hospital building in Erbil city, which was constructed before releasing the seism
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreRelying on modern work strategies, such as adopting scientific inductions, consolidates the information in the learner’s memory, develops the skill work of the football player, and raises the efficiency of their motor abilities. From this standpoint, the researcher, who is a teacher at the University of Baghdad, College of Physical Education and Sports Sciences, and follows most of the sports club teams in youth football, believes that there must be From extrapolations through the machine and employing it in the field to serve the skill aspect and benefit from scientific technology in development and making it a useful tool to serve the sports field in football, as the goal of the research was the efficiency of machine extrapolation in de
... Show MoreThe importance of the research is evident in the use of exercises with the training device, which is one of the modern techniques in teaching the abilities of players, especially in teaching the skill of the backhand, and in improving the accuracy of the performance of players and increasing the contribution to the formation of a base for the game for players who have a good level of learning and upgrading the game to reach a certain achievement, and the research issue was represented in the lack of accuracy in sending balls to the required areas to achieve points, especially in the performance of the skill of the backhand due to the speed of play during the course of the match, and the study aimed to introduce modern technology usi
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper